1.
What is botnet?
Botnet is a network of private
computer infected with malicious software and control as a group without the owner’s knowledge.For example,to send spam, virus,attack computers and server
and to commit other kind of crime and fraud.
2. Describe
some of the main point of the Digital Agenda for Europe.
The main objective of Digital
Agenda for Europe is develop a digital single market in order to generate
smart,sustainable and inclusive growth in Europe.
Actions are to taken under Digital
Agenda
-Telecommunication services should
be unified.Numbering of services and spectrum bands should be harmonized.
-Enhance the interoperability of
devices,applications,data respositories,services and networks.Continue the
review of standard setting policy should be done and promote appropriate rules
for intellectual property rights.
-Strengthen its policy to combat
cybercrime,child pornography and breaches of privacy and personal data security
to against cyber attack.
Next,provide competitively priced
fast and ultra fast internet access for all.Use European fund in order to
finance investment in broadband.
3. Explain
how a cyber attack can be carry out?
Cyber attacks are socially or
politically motivated attacks carried out primary through the internet.Attack
target the general public or national and corporate organization are carried
out though the spread of malicious program which are viruses,unauthorized web
access,fake wedsite and other means of stealing personal or institutional
information from targets of attacks,causing far-reading damage.
The
attack was performed using a variety of techniques,ranging from simple
individual ping commands and message floading to move sophisticated distributed
denial of service (DDOS) attacks.Hackers coordinated the attack by using a
large number of compromised servers organized in a botnet distributed around
the world.Once a computer is infected it becomes part of a network of thousands
of ‘zombie’ machine that are commanded to carry out the attack.
4. Describe
some of the exploited by malware
First,malware exploits weak points
or vulnerabilities,in widely used technologies.The myriad rapidly developing
applications that made up the web provide a wealth of vulnerabilities for
online criminal to exploit.
The
malware found on a malicious website-such as one involved in an iFrame attack-begins a series of probes ,looking for
unpatched weakness in browser,the myriad browser plug-ins you might have
installed,your operating system or application that running.
When
a useful vulnerability is found,malware attack is to create a buffer overflow
condition in computer then it gives malware the capability to download of
harmful code-the keyloggers,botnet software,spyware and generaters or other
malware.
Besides,malware
creatures and distributors also take advantage of weaknesses in human
nature,such as curiousity,trust,desire for connection and carelessness to dupe
users into handling over keys to their system security.
No comments:
Post a Comment